A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
History

Wed, 25 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-385

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01029}

epss

{'score': 0.01057}


Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Mon, 16 Sep 2024 13:30:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2024-01-16T11:40:50.677Z

Updated: 2026-02-25T18:21:01.087Z

Reserved: 2024-01-15T04:35:34.146Z

Link: CVE-2024-0553

cve-icon Vulnrichment

Updated: 2024-08-01T18:11:35.649Z

cve-icon NVD

Status : Modified

Published: 2024-01-16T12:15:45.557

Modified: 2026-02-25T19:29:28.613

Link: CVE-2024-0553

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-16T00:00:00Z

Links: CVE-2024-0553 - Bugzilla